acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

USACM Vice-Chair Testifies on Challenges of Electronic Employment Verification
From U.S. Public Policy Committee of the ACM

USACM Vice-Chair Testifies on Challenges of Electronic Employment Verification

On April 14, Dr. Annie Ant

SAS and JMP Compared and Examined
From The Eponymous Pickle

SAS and JMP Compared and Examined

A good post from SASCom Voices on SAS vs JMP.  I used both in the enterprise, SAS from the very beginning in 1978.  Considerably later JMP was brought it and got...

WikiLeaks Cable about Chinese Hacking of U.S. Networks
From Schneier on Security

WikiLeaks Cable about Chinese Hacking of U.S. Networks

We know it's prevalent, but there's some new information: Secret U.S. State Department cables, obtained by WikiLeaks and made available to Reuters by a third party...

Humanlike Robotics
From The Eponymous Pickle

Humanlike Robotics

In Foresight: " ..  David Hanson, the founder and CTO of Hanson Robotics, a maker of humanlike robots and AI software, has a stimulating article in IEEE Spectrum...

links for 2011-04-18
From Wild WebMink

links for 2011-04-18

A Government Plan for IDs to Replace Online Passwords Presumably this is the simplified version and there's a security professional who truly understands the nature...

Interesting Links Post 18 April 2011
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Interesting Links Post 18 April 2011

Imagine Cup US is over and now we start thinking and planning for the Worldwide Imagine Cup finals in New York City this summer. The CSTA CS & IT Conference will...

New Culture of Learning
From The Eponymous Pickle

New Culture of Learning

New book that looks at the future of learning: A New Culture of Learning: Cultivating the Imagination for a World of Constant Changeby Douglas Thomas and John Seely...

Chasing 1 Billion New Consumers
From The Eponymous Pickle

Chasing 1 Billion New Consumers

My former employer, Procter & Gamble is seeking to extend its reach to many new consumers in all parts of the world.  This direction has been evolving for a number...

Identifying Influencers on Twitter
From The Noisy Channel

Identifying Influencers on Twitter

One of the perks of working at LinkedIn is being surrounded by intellectually curious colleagues. I recently joined a reading group and signed up to lead our discussion...

Keeping Company Data Safe on Personal Devices
From The Eponymous Pickle

Keeping Company Data Safe on Personal Devices

A good general article on keeping company data safe on personal devices. It is becoming increasingly important.  In  conversation I had with a company security...

Learning Traffic Patterns
From The Computing Community Consortium Blog

Learning Traffic Patterns

We’ve blogged about exciting computing innovations to improve transportation before — and

Boring is Bad
From Computer Science Teacher - Thoughts and Information From Alfred Thompson

Boring is Bad

I have long been an advocate that teaching should be as much about sharing enthusiasm and it is about imparting information. Teachers who are bored or down on the...

links for 2011-04-16
From Wild WebMink

links for 2011-04-16

A Legacy at Risk: How the new Ministry of Culture in Brazil reversed its digital agenda | Freedom to Tinker "a new generation that has risen for the first time...

Learning in a Virtual Environment
From The Eponymous Pickle

Learning in a Virtual Environment

In Chief Learning Officer, a blog that has been including some very useful content lately. " ... Virtual learning has pros and cons, but with proper design and...

E-Book Sales Triple
From The Eponymous Pickle

E-Book Sales Triple

A report that e-Book sales in the US are overtaking paper.

Friday Squid Blogging: Omega 3 Oil from Squid
From Schneier on Security

Friday Squid Blogging: Omega 3 Oil from Squid

New health supplement.

A Brief History of the Internet and it's Future
From The Eponymous Pickle

A Brief History of the Internet and it's Future

20th Annual E. Leonard Arnoff Memorial Lectureon the Practice of Management Science

Speaking about open science
From Michael Nielsen

Speaking about open science

Over the next few months, I

What the Future Holds
From Computer Science Teachers Association

What the Future Holds

Recently I had an opportunity to attend the Tapia Conference and an interesting keynote given by Irving Wladawsky-Berger which provided interesting food for thought...

"Schneier's Law"
From Schneier on Security

"Schneier's Law"

Back in 1998, I wrote: Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can't break. In 2004, Cory Doctorow...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account